Showing 721 - 740 results of 2,632 for search '((shing OR (ssspinge OR line)) OR (((bring OR sping) OR (pinga OR singal)) OR (pin OR ping)))', query time: 0.21s Refine Results
  1. 721

    Cards of feelings by Dai, Yunlang

    Published 2021
    “…Cards of Feelings is a set of playing cards created to shape meaningful conversations between friends, family, and significant others that bring them closer to not just each other, but also themselves. …”
    Get full text
    Final Year Project (FYP)
  2. 722

    灸 (jiu) by Ye, Luwei

    Published 2014
    “…Traditional Chinese Medical treatment is integrated with modern technology to bring about optimal therapeutic effect, sensitive to the needs of wearer to relieve periodic pain and muscle tension.…”
    Get full text
    Final Year Project (FYP)
  3. 723

    Women in combat roles in US military : still a small step to equality by Fitriani, Matthews, Ron

    Published 2012
    “…How big a change will this shift in policy bring to the structure of the US military?…”
    Get full text
    Get full text
    Commentary
  4. 724
  5. 725
  6. 726
  7. 727

    Paperless office for designers by Chang, Linlin

    Published 2016
    Get full text
    Final Year Project (FYP)
  8. 728

    Automated teller machines in Singapore by Soh, Yong Chee, Phua, Alice Loo Huay, Tan,Yang Leng

    Published 2015
    “…Activation of ATMs can also be enhanced by substituting the present A TM card and PIN system with either voice recognition, retina recognition or thumbprints. …”
    Get full text
    Final Year Project (FYP)
  9. 729

    Real time analysis of social behavior from video and kinect recordings by Ramasamy, Pandi Ramesh

    Published 2016
    “…Finally,analysis will be performed using pattern recognition algorithms and machine learning classifiers to detect the emotion of the subject.In this project,machine learning classifiers such as K-nearest neighbors,Naive Bayes and C4.5 Decision tree learning has been used. The prime aim is to pin point the most seemly machine learning classifier for obtaining highest accuracy for classification.…”
    Get full text
    Thesis
  10. 730

    Living Together Across Borders : Communicative Care in Transnational Salvadoran Families / by Arnold, Lynnette, author 656202, Oxford University Press (Online service) 655242

    Published 2024
    “…The book demonstrates that these communicative practices bring inequities between Global North and South into family life by continually reproducing distinctions between relatives in El Salvador and those living in the United States. …”
    Get full text
    software, multimedia
  11. 731

    SUPERHERO OF LOVE : HEAL YOUR BROKEN HEART & THEN GO SAVE THE WORLD / by Fonger, Bridget, 1962-, author 655765

    Published 2019
    “…This book helps clear the decks by shedding light on the shadow-filled, broken pieces of the reader's heart to bring them to an even stronger, healthier, more powerful place. …”
    text
  12. 732

    Rapid process modeling of the aerosol jet printing based on gaussian process regression with latin hypercube sampling by Zhang, Haining, Moon, Seung Ki, Ngo, T. H., Tou, J., Bin Mohamed Yusoff, M. A.

    Published 2021
    “…Hence, it is necessary to develop a small data set based machine learning approach to model relationship between the process parameters and the line morphology. In this paper, we propose a rapid process modeling method for AJP process and consider sheath gas flow rate, carrier gas flow rate, stage speed as AJP process parameters, and line width and line roughness as the line morphology. …”
    Get full text
    Journal Article
  13. 733
  14. 734
  15. 735

    Returning Indonesian fighters from Syria and Iraq : learning from the past by Navhat Nuraniyah

    Published 2015
    “…Indonesian fighters with the self-declared Islamic State (IS) recently posted a video threatening to bring the armed struggle home. Indonesia can learn a lot from past handling of former foreign fighters who returned from the Afghan and Mindanao battlefronts.…”
    Get full text
    Get full text
    Commentary
  16. 736

    Design and evaluation of ATM and satellite interconnecting system by Cong, Rong.

    Published 2008
    “…This project aims to design and evaluate an ATM and Satellite Interconnecting System, which can extend or bring into being the multimedia superhighway in the near future.…”
    Get full text
    Thesis
  17. 737

    Demography-religion nexus: tipping point for societal norms by Mohammad Alami Musa

    Published 2022
    “…The recent debate about repealing Section 377A that criminalises sex between men assumes a high signature because it may lead to a social change in Singapore. It can potentially bring a largely conservative Singaporean society to a tipping point where many of its traditional pro-family norms may be undermined, even replaced with secular-liberal norms, leading to a decline in religion. …”
    Get full text
    Commentary
  18. 738

    Deconstructing the kiasu parent in Singapore by Amirah Arip

    Published 2013
    “…This study seeks to rationalize the stereotypical images of the Singaporean kiasu parent using the structural-educational context of Singapore. I will also bring in new perspectives of childhood, such as the notion of the Athenian child, to explain their motivations to put pressure on their children at an early age despite their hesitations for doing so. …”
    Get full text
    Final Year Project (FYP)
  19. 739

    Manifest the unseen by Hon, Vanessa Shemander

    Published 2018
    “…This project aims to question the stereotype of imperfections and hopefully bring about a change in perspective of imperfections, that by living in harmony with our imperfections then can we reach our greater potential.…”
    Get full text
    Final Year Project (FYP)
  20. 740

    Japan’s New Cybersecurity Strategy : Plugging the IoT Gap by Matsubara, Mihoko

    Published 2018
    “…Japan should craft a new Cybersecurity Strategy to encourage risk-averse business leadership to tackle shadow IT and bring visibility and control on two key fronts: first, endpoint security to protect computers, servers, and wireless devices and second, cloud security to protect data, applications, and infrastructure of cloud computing.…”
    Get full text
    Get full text
    Commentary